مرور Volume 9, Issue 2 بر اساس عنوان
در حال نمایش موارد 1 - 7 از 7
- 
Analyzing new features of infected web content in detection of malicious web pages (Iranian Society of Cryptology, 2017-07-01)Recent improvements in web standards and technologies enable the attackers to hide and obfuscate infectious codes with new methods and thus escaping the security filters. In this paper, we study the application of machine ...
 
- 
Cipher text only attack on speech time scrambling systems using correction of audio spectrogram (Iranian Society of Cryptology, 2017-07-01)Recently permutation multimedia ciphers were broken in a chosen-plaintext scenario. That attack models a very resourceful adversary which may not always be the case. To show insecurity of these ciphers, we present a ...
 
- 
An efficient secure channel coding scheme based on polar codes (Iranian Society of Cryptology, 2017-07-01)In this paper, we propose a new framework for joint encryption encoding scheme based on polar codes, namely efficient and secure joint secret key encryption channel coding scheme. The issue of using new coding structure, ...
 
- 
A new CPA resistant software implementation for symmetric ciphers with smoothed power consumption: SIMON case study (Iranian Society of Cryptology, 2017-07-01)In this paper we propose a new method for applying hiding countermeasure against CPA attacks. This method is for software implementation, based on smoothing power consumption of the device. This method is evaluated on the ...
 
- 
On the computational complexity of finding a minimal basis for the guess and determine attack (Iranian Society of Cryptology, 2017-07-01)Guess-and-determine attack is one of the general attacks on stream ciphers. It is a common cryptanalysis tool for evaluating security of stream ciphers. The effectiveness of this attack is based on the number of unknown ...
 
- 
Phishing website detection using weighted feature line embedding (Iranian Society of Cryptology, 2017-07-01)The aim of phishing is tracing the users' s private information without their permission by designing a new website which mimics the trusted website. The specialists of information technology do not agree on a unique ...
 



